What is a risk associated with attempting to control physical access to sensitive areas such as computer rooms using card keys or locks?
When developing a disaster recovery plan, the criteria for determining the acceptable downtime should be the:
To ensure that all aspects of the disaster recovery plan are evaluated in a cost effective manner, an IS auditor should recommend the use of a:
Of the following alternatives, the FIRST approach to developing a disaster recovery strategy would be to assess whether: